Skip to main content

Perceptually Tuned Auto-correlation Based Video Watermarking Using Independent Component Analysis

  • Conference paper
Advances in Multimedia Information Processing - PCM 2005 (PCM 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3768))

Included in the following conference series:

  • 983 Accesses

Abstract

Video watermarking hides information (e.g. ownership, recipient information, etc) into video contents. Video watermarking research is classified into (1) extension of still image watermarking, (2) use of the temporal domain features, and (3) use of video compression formats. In this paper, we propose a watermarking scheme to resist geometric attack (rotation, scaling, translation, and mixed) for H.264 (MPEG-4 Part 10 Advanced Video Coding) compressed video contents. Our scheme is based on auto-correlation method for geometric attack, a video perceptual model for maximal watermark capacity, and watermark detection based on natural image statistics. We experiment with the standard images and video sequences and the result shows that our video watermarking scheme is robust against H.264 video compression (average PSNR = 31 dB) and geometric attacks (rotation with 0-90 degree, scaling with 75-200%, and 50%~75% cropping).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bas, P., Chassery, J.M., Macq, B.: Geometrically invariant watermarking using feature points. IEEE Trans. Image Proc. 11(9), 1014–1028 (2002)

    Article  Google Scholar 

  2. O’Ruanaidh, J.J., Pun, T.: Rotation, scale and translation invariant digital image watermarking. In: Proc. IEEE Int. Conf. Image Proc., pp. 536–539 (1997)

    Google Scholar 

  3. Pereira, S., Pun, T.: Robust template matching for affine resistant image watermarks. IEEE Trans. Image Proc. 9(6) (June 2000)

    Google Scholar 

  4. Kutter, M.: Watermarking resisting to translation, rotation, and scaling. In: Proc. of SPIE Int. Conf. on Multimedia Systems and Applications. LNCS, vol. 3528, pp. 423–431 (1998)

    Google Scholar 

  5. Su, P.-C., Kuo, C.-C.J.: Synchronized detection of the block-based watermark with invisible grid embedding. In: Proc. SPIE Electronic imaging (Security and Watermarking of Multimedia Contents III) (2001)

    Google Scholar 

  6. Lee, C.H., Lee, H.K., Suh, Y.H.: Autocorrelation Function-based Watermarking with Side Information. In: IS&T/SPIE, 15th Annual Symposium Electronic Imaging Science and Technology: Security and Watermarking of Multimedia Contents, San Jose, USA, January 2003, pp. 20–24 (2003)

    Google Scholar 

  7. Voloshynovskiy, S., Herrige, A., Baumgaertner, N., Pun, T.: A stochastic approach to content adaptive digital image watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 211–236. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  8. Watson, A.B., Borthwick, R., Taylor, M.: Image quality and entropy masking. In: Proc. SPIE Conf. Human Vision, Visual Processing, and Digital Display VI (1997)

    Google Scholar 

  9. Podilchuk, C., Zeng, W.: Image adaptive watermarking using visual models. IEEE J. Selected Areas in Communications 16(4) (May 1998)

    Google Scholar 

  10. Kim, S.W., Suthaharan, S., Lee, H.K., Rao, K.R.: An image watermarking scheme using visual model and BN distribution. IEE Elect. Letter 35(3) (February 1999)

    Google Scholar 

  11. Sung, H.S., Kim, S.W.: A robust video watermarking scheme for geometric attack and H.264 compression. ICIP submitted

    Google Scholar 

  12. Barni, M., Bartolini, F., Cappellini, V., Lippi, A., Piva, A.: A DWT based technique for spatio frequency masking of digital signatures. In: Proc. IS&T/SPIE Conf. Security and watermarking of multimedia contents, January 1999. LNCS, vol. 3657, pp. 31–39 (1999)

    Google Scholar 

  13. http://www.its.bldrdoc.gov/vqeg/

  14. http://www.petitcolas.net/fabien/watermarking/stirmark/

  15. Hinton, G.E., Sejnowski, T.J.: Unsupervised learning: foundations of neural computation (edited). MIT Press, Cambridge (1999)

    Google Scholar 

  16. Bell, A.J., Sejnowski, T.J.: The ‘independent components’ of natural scenes are edge filters. Vision Research 37(23), 3327–3338 (1997)

    Article  Google Scholar 

  17. van Hateren, J.H., van der Schaaf, A.: Independent component filters of natural images comared with simple cells in primary visual cortex. Proc. Royal Soc. Lond. B. 265, 359–366 (1998)

    Article  Google Scholar 

  18. Hyvarinen, A.: Sparse Code Shrinkage: De-noising of non-gaussian data by maximum likelihood estimation. Neural Computation 11(7), 1739–1768 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, SW., Sung, HS. (2005). Perceptually Tuned Auto-correlation Based Video Watermarking Using Independent Component Analysis. In: Ho, YS., Kim, HJ. (eds) Advances in Multimedia Information Processing - PCM 2005. PCM 2005. Lecture Notes in Computer Science, vol 3768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11582267_32

Download citation

  • DOI: https://doi.org/10.1007/11582267_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30040-3

  • Online ISBN: 978-3-540-32131-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics